Новости о Exploit Security [ Фото новости ] [ Свежие новости ] | |
Shido token dives over 90% after Ethereum staking contract exploit
A security breach on the layer-1 blockchain Shido has led to a dramatic drop in its token value, plunging by over 90% within a mere half-hour period. The incident occurred after an exploit was detected, with blockchain security firm PeckShield… дальше »
2024-2-29 11:43 | |
Security researchers detect new variant of Monero mining exploit Tor2Mine
The industry woke up today to the news of Bitmart exchange being exploited to the tune of nearly $200 million in stolen funds through Ethereum and Binance Smart Chain. With exploits becoming commoner The post Security researchers detect new variant of Monero mining exploit Tor2Mine appeared first on AMBCrypto. дальше »
2021-12-5 16:00 | |
Automated Market Maker Glide Finance Exploited, Post-Mortem Reveals It Was The Teams Own Fault
A little-known DEX, Glide Finance, was exploited for $300,000 late on Sunday, and funds were drained from their pair contracts. The audit protocol said while diagnosing the root cause of the exploit, they found that it wasn't the smart contract auditor Paladin Blockchain Security’s fault, rather their own. дальше »
2021-10-18 16:02 | |
What Are Dusting Attacks & How To Prevent Them?
There is an ongoing arms race in the tech security industry. The bad guys find another way to exploit the system and the good guys try to patch up the leak. It’s not necessarily a bad thing. It’s how security tech advances, and it drives the cryptography industry. дальше »
2021-9-22 15:15 | |
Exploding NFT Market Attracts Hordes of Scammers and Hackers – Here’s What You Should Know
As the rapidly growing NFT market continues to attract waves of attention, hackers and scammers see a new frontier in the industry. Historically, imposters have been attempting to exploit the crypto industry using any security loophole or scamming tool they could get their hands on. дальше »
2021-9-5 15:40 | |
How A Security Vulnerability Affected Ethereum And Led To A Chain Split
The Ethereum network is facing a chain split after an exploit forced over 50% of its nodes to upgrade their client to prevent further attacks. This security vulnerability was detected, reported, and fixed by Go Ethereum, developers of the affected client, Geth. дальше »
2021-8-28 21:23 | |
BUNNY Down Over 97% from its April Peak, Project Enhances Security Protocol After the 2nd Exploit
PancakeBunny, BSC-based decentralized finance (DeFi) yield farming aggregator and optimizer, has been hacked yet again. Two months ago, PancakeBunny got rekt on Binance Smart Chain, and this time, the same happened on Ethereum sidechain Polygon. дальше »
2021-7-20 16:32 | |
THORChain hit by another exploit; loses up to $7.6M
With the emergence of cryptocurrencies, also came a corresponding rise in ransomware attacks. Several security loopholes in the cryptocurrency space in general, and smart contract platforms in particuThe post THORChain hit by another exploit; loses up to $7.6M appeared first on AMBCrypto. дальше »
2021-7-16 10:17 | |
EasyFi Loses $80 Million Worth of Tokens in A ‘Mnemonic Key’ Security Breach
Founder Ankitt Gaur claims this was a “mnemonic key hack,” not a smart contract exploit. EASY has tanked over 22% following reports of the hack. The post EasyFi Loses Million Worth of Tokens in A ‘Mnemonic Key’ Security Breach first appeared on BitcoinExchangeGuide. дальше »
2021-4-22 05:49 | |
Ledger Patches Nano X Supply Chain Vulnerability
The Ledger security team has patched a hardware exploit that could compromise Ledger Nano X wallets as a part of a supply chain attack. Following a report from Kraken Security Labs, a cybersecurity division of Kraken, that showed that the Ledger hardware wallet was susceptible to a supply chain attack, the device manufacturer has announced […] The post Ledger Patches Nano X Supply Chain Vulnerability appeared first on BeInCrypto. дальше »
2020-7-9 12:12 | |
DeFi Apps Represent 24/7 Multi-Million Dollar Hacker Honeypots
A recent smart contract exploit resulted in the loss of 1,193 ETH. The incident has prompted questioning of the security of the rapidly evolving DeFi sector. Over the weekend, the exploitation of a smart contract vulnerability forced developers at Ethereum-based app Fulcrum to partially disable its smart contract. дальше »
2020-2-23 19:10 | |
Since bZx Exploit, Enthusiasts Flock to DeFi Insurance
The recent bZx exploit has the DeFi community searching for answers in the midst of a security crisis. Insurance is an efficient way to protect oneself against risk, and DeFi...The post Since bZx Exploit, Enthusiasts Flock to DeFi Insurance appeared first on Crypto Briefing. дальше »
2020-2-18 18:20 | |
DeFi Protocol bZX Suffered From a Smart Contract Exploit
The world of decentralized finance has yet to be put through a big security audit. For bXZ, such an audit will come too late, as the DeFi protocol has already been hacked. Earlier today, news broke of an incident affecting bXZ. дальше »
2020-2-16 06:00 | |
StrandHogg Android Vulnerability Can Grab Wallet and Banking Information
StrandHogg has already been used for accessing banking data. The exploit has been documented by security company Promon and seems to affect all Android versions. Since researchers in the security field have been knowing about the StrandHogg proof-of-concept model ever since 2015, the exploit isn’t at all new. дальше »
2019-12-4 02:00 | |
WordPress Servers Are Being Targeted by New Cryptojacking Plugins
WordPress plugins are typically used to provide webmasters with additional functionality for their websites. However, what they might not know is that some of these plugins may contain a hidden cryptocurrency mining exploit. дальше »
2019-10-20 23:42 | |
Android users suckered for $100s by basic calculator and QR scanning apps
If all the different types of malware that find a way to sneak into the Google Play Store wasn’t enough, here’s another nasty surprise. A new category of apps called “Fleeceware” has been unearthed on the app distribution platform; these apps were found to abuse the Play Store policies and grossly charge users hundreds of dollars for mundane services like calculators and QR code scanners. дальше »
2019-9-26 09:30 | |
Crypto Wallet Keys Could Be Stolen Due To Weak Intel Chips
Cryptography is all about security. The notion of having a public and private crypto wallet key and multiple hashes adds to those layers of security but at the bottom of it all is a computer processing all of the data. дальше »
2019-9-13 23:00 | |
Apple claps back at Google for spreading FUD in iOS exploit report
It was just last week that we covered a report by Google‘s Project Zero security researchers claiming they’d identified a malware campaign targeting iPhones for “at least two years. ” When successful, the exploit chain allowed iPhones to be compromised with no interaction from the user beyond visiting a malicious website. дальше »
2019-9-7 23:09 | |
Google researchers reveal data-stealing, web-based iPhone exploit that was active for years
Researchers from Google have uncovered what appears to be a concentrated malware campaign targeting iPhones for at least two years. Thankfully, this may be over now, although they warn it’s possible there are others that are yet to be seen. дальше »
2019-8-30 10:02 | |
Researcher discloses second Steam zero-day exploit after being shut out of bug bounty program
A second zero-day vulnerability has been publicly disclosed in the Steam gaming client by security researcher Vasily Kravets after he said he was banned from its bug-bounty program. The revelations come two weeks after another zero-day previously disclosed by Kravets and researcher Matt Nelson was disputed by Valve, Steam’s parent company. дальше »
2019-8-22 09:52 | |
Kink in porn site exposes the personal data of over 1M users
Another day, another data breach. This time, the victim is adult website Luscious, which lets users upload pornographic images and animations behind anonymous usernames. But as it turns out, the promise of anonymity might’ve been misleading, to say the least. дальше »
2019-8-20 13:05 | |
Critical KNOB exploit penetrates gaping Bluetooth vulnerability
Researchers have discovered a vulnerability in Bluetooth’s authentication protocols which, if properly executed, could allow an attacker to conduct a man-in-the-middle attack between two paired devices. дальше »
2019-8-16 16:19 | |
Report: Researchers Discover New Cryptojacking Malware for Mining Monero
Varonis, a data security and analytics company, has discovered new strains of cryptojacking malware that hijacks a victim’s computer resources to mine monero (XMR), and a mysterious web shell while investigating the cause of a cryptomining infection for a client. дальше »
2019-8-15 19:00 | |
Researchers hacked a Canon DSLR with Bitcoin demanding ransomware
Bitcoin demanding ransomware knows no bounds, and the latest potential victim? DSLR cameras. A group of security researchers have managed to exploit vulnerabilities in a Canon EOS 80D digital camera to hold its owner’s photos to a Bitcoin ransom, The Inquirer reports. дальше »
2019-8-12 16:59 | |
Researchers break iPhone’s FaceID by putting modified glasses on unconscious people
Security researchers have cracked Apple’s FaceID biometric system yet again. But there’s an unusual caveat to this trick: to successfully unlock an iPhone, the attackers first need to make sure the victim is out cold. дальше »
2019-8-9 12:43 | |
WhatsApp’s chat manipulation exploit remains unresolved even after a year (Updated)
Vulnerabilities uncovered in WhatsApp — the messaging app used by about 1. 5 billion users across the world — can allow bad actors to exploit the platform to manipulate or spoof chat messages. The flaws would make it possible to “intercept and manipulate messages sent in both private and group conversations, giving attackers the power to create and spread misinformation from what appear to be trusted sources,” the researchers noted. дальше »
2019-8-8 14:01 | |
0X Exchange shuts down v2.0 contracts due to potential exploit; deployed patched versions
0x, an open protocol that enabled the peer-to-peer exchange of assets on the Ethereum blockchain, shut down their v2 Exchange due to a flaw in its Exchange contract which was identified by a third-party security researcher Sam Sun. дальше »
2019-7-14 16:00 | |
Zero Day Vulnerabilities on Mozilla Targeted Coinbase Employees
Security researchers at Google and Coinbase discovered a zero day exploit on the Firefox browser that would allow an attacker to remotely execute code on an underlying operating system, as reported by ZDNet, June 18, 2019. дальше »
2019-6-23 13:00 | |
[Security Alert] Update Firefox Browser Now as Hackers Exploit a Serious Bug Targeting Major Crypto Exchanges Users
Mozilla has issued a security alert warning that hackers are taking advantage of a serious bug in their Firefox browser, which can be used to take over the entire computer. The company has warned that crypto owners face the highest level of an imminent attack, the Next Web reports. Firefox users have been asked to […] дальше »
2019-6-19 21:03 | |
Yet another cryptocurrency mining botnet caught targeting China
It seems we can’t go more than a week without news of a new cryptocurrency mining malware or botnet being discovered. This time, security researchers have uncovered another Monero mining botnet that’s targeting China. дальше »
2019-6-13 16:02 | |
Cryptocurrency hackers sneak malware into Oracle servers to mine Monero
Security researchers have identified yet another cryptocurrency mining malware. This time it’s installing itself on enterprise application servers, and using a clever trick to remain hidden. If that wasn’t enough, the malware has already claimed its first major victim: Oracle servers. дальше »
2019-6-11 13:22 | |
Infographic: An Overview of Compromised Bitcoin Exchange Events
The purpose of this infographic is to visualize the size of large cryptocurrency hacks that have occurred in the past as if they all happened today. The hacks included in this infographic extend beyond exchanges, as there were other large entities that experienced cryptocurrency hacks, such as marketplaces like Silk Road 2. дальше »
2019-5-25 21:56 | |
BitDefender researchers discover terrifying security vulnerability in Intel CPUs
Researchers from Romanian security firm BitDefender have uncovered a troubling security vulnerability in Intel processors that could allow an attacker to access privileged kernel-mode information typically considered “off limits” for most applications. дальше »
2019-5-14 19:59 | |
Criminals Raise the Stakes in Crypto Mining Malware Using Confluence Exploit Per Trend Micro Find
Cybercriminals are getting bolder and smarter all the time and it is hard to keep up with them, as they keep finding new exploits in several pieces of software. Now, it was recently discovered by the security intelligence company Trend Micro that the Confluence software, created by Atlassian, was used to spread crypto mining malware. […] дальше »
2019-5-8 02:30 | |
Cornell Tech Research: Dangerous Arbitrage Bots Are Exploiting Decentralized Exchanges
There is a new trend in the market. People are using arbitrage bots to exploit innefficiencies in decentralized exchanges (DEX) in order to get more profit. This was originally reported by Homeland Security News Wire, which used research from Cornell Tech in order to affirm that some “predatory users” were profiting from these exchanges this […] дальше »
2019-5-8 23:00 | |
New Cryptojacking Campaign Infects Asia Using More Profitable Tactics
Cryptojacking — the process of infecting computers with malware to mine cryptocurrency — has declined alongside prices during cryptowinter. But like any dextrous organism facing extinction, the virus and its propagators are adapting. дальше »
2019-4-27 22:07 | |
Steam vulnerability exposed users to account hijacking and malware
A vulnerability in Valve‘s Steam platform made it possible for malicious actors to take over user accounts, pilfer their items, and even infect their systems with additional malware. The security kink resided in Steam‘s server browser functionality – which lets players look up severs for a number of games (including hit titles like CS:GO, Half-Life 2, and Team Fortress 2) – according to a HackerOne vulnerability disclosure made public on March 15. дальше »
2019-3-21 19:42 | |
Will This Vulnerability Finally Compel Bitmain to Open Source Its Firmware?
As if Bitmain’s year hasn’t been rough enough, having posted big losses and laying off entire departments, its flagship product now has a firmware vulnerability. A few weeks ago, Bitcoin Core contributor James Hilliard discovered an exploit in Bitmain’s S15 firmware. дальше »
2019-2-21 23:44 | |
Investigation Reveals Criminals Exploit Fortnite V-Bucks To Launder Money Without Players Knowledge
Fortnite has become a major success since its original launch, but cybercriminals have found a way to exploit it for their own gain with underhanded actions. In a report from The Block, it appears that these cybercriminals infiltrated the fairly weak security system allowed them to sell V-Bucks, the in-game currency of Fortnite, which were […] дальше »
2019-1-17 07:23 | |
Neutrino: A Privacy-Preserving Light Wallet Protocol
Lightning is all the rage these days and, while it's an exciting development, users currently have to have a full node running in order to transact in it. In this article, I'm going to introduce Neutrino, a new protocol for light clients to get the data that they need while preserving privacy and without trusting a central server. дальше »
2019-1-4 21:11 | |
Security Researchers Reveal Wallet Vulnerabilities On Stage at 35C3
In a demonstration titled “Wallet. fail,” a team of security researchers hacked into the Trezor One, Ledger Blue and Ledger Nano S. Unfortunately, it appears as if their findings were first put on display at the 35th Chaos Communication Congress (35C3) in Leipzig, Germany, rather than through accepted Responsible Disclosure practices, which would have allowed the manufacturers to patch the vulnerabilities and protect their customers from any potential attack. дальше »
2019-1-1 19:15 | |
This is the future of authentication, according to security experts
Passwords may not have been much of an annoyance back in the 1960s, when they were first believed to have been introduced to the world of computing. But as we’ve increasingly adopted a wide range of personal gadgets and online services, they’ve become a pain to manage, and a point of vulnerability that hackers can exploit when conditions are in their favor. дальше »
2018-12-19 12:00 | |
Facebook bug allowed websites to grab unsuspecting users’ personal data
Security firm Imperva found a bug in May that allowed websites to read Facebook users and their friends’ private information. The troubling vulnerability let a site access users’ likes and interests through a manipulated Facebook Graph query. дальше »
2018-11-14 09:24 | |
Hackers exploit Bitcoin inflation bug to print 235M fake Pigeoncoins
The collateral damage from Bitcoin’s epic inflation bug continues to spread. The developers of small-cap cryptocurrency Pigeoncoin have confirmed hackers successfully exploited the vulnerability to print 235 million Pigeoncoins, worth around $15,000. дальше »
2018-10-3 14:40 | |
Bitcoin Core Bug Resolved in 0.16.3 Client: Threatened Security of Lightning Network
A GitHub report opened on September 17, 2018, revealed a recent bug in the Bitcoin Core versions 0. 14. 0 to 0. 16. 2. The exploit threatened to crash Bitcoin Core if the most recent version wasn’t updated. дальше »
2018-9-20 23:00 | |
Hackers Find Goldmine by Cryptojacking Indian Government Websites
As the Indian government further complicates their stance on whether or not citizens should be allowed to trade and own cryptocurrencies, hackers have found a way to exploit government websites in order to make a fortune in cryptocurrency through a popular hack called cryptojacking. дальше »
2018-9-18 00:00 | |
Hackers Are Still Cryptojacking Smartphones to Mine For Cryptocurrencies
Security experts recently discovered that hackers are now mining for cryptocurrencies using smartphones. On August 22, 2018, The Daily Mail reported the growing problem and highlighted the need to protect users’ smartphones. дальше »
2018-8-23 00:00 | |